URL: https://vpn.rgr.ooo/
Submission: On September 06 via automatic, source certstream-suspicious

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 109.172.51.252, located in Voronezh, Russian Federation and belongs to SUMTEL-AS-RIPE Moscow, Russia, RU. The main domain is vpn.rgr.ooo.
TLS certificate: Issued by Let's Encrypt Authority X3 on July 26th 2020. Valid for: 3 months.
This is the only time vpn.rgr.ooo was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 109.172.51.252 41691 (SUMTEL-AS...)
3 1
Apex Domain
Subdomains
Transfer
3 rgr.ooo
vpn.rgr.ooo
21 KB
3 1
Domain Requested by
3 vpn.rgr.ooo vpn.rgr.ooo
3 1

This site contains links to these domains. Also see Links.

Domain
www.zimbra.com
blog.zimbra.com
wiki.zimbra.com
Subject Issuer Validity Valid
black-box.su
Let's Encrypt Authority X3
2020-07-26 -
2020-10-24
3 months crt.sh

This page contains 1 frames:

Primary Page: https://vpn.rgr.ooo/
Frame ID: 23E91DB6C98FC28DE4E5C1EC54D8F1AB
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

21 kB
Transfer

74 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
vpn.rgr.ooo/
13 KB
5 KB
Document
General
Full URL
https://vpn.rgr.ooo/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
109.172.51.252 Voronezh, Russian Federation, ASN41691 (SUMTEL-AS-RIPE Moscow, Russia, RU),
Reverse DNS
Software
nginx /
Resource Hash
23fa834c655ffa25ae119fbd22942e13a4f5bb19b0b91ad3de60991455f2969e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Host
vpn.rgr.ooo
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx
Date
Sun, 06 Sep 2020 21:09:33 GMT
Content-Type
text/html;charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Frame-Options
SAMEORIGIN
Expires
-1
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Pragma
no-cache
Content-Language
en-US
Set-Cookie
ZM_TEST=true;Secure ZM_LOGIN_CSRF=6adcbf2c-1ff1-49bc-af51-c00f3c7a0231;Secure;HttpOnly
Vary
User-Agent Accept-Encoding
X-UA-Compatible
IE=edge
Content-Encoding
gzip
common,login,zhtml,skin.css
vpn.rgr.ooo/css/
58 KB
12 KB
Stylesheet
General
Full URL
https://vpn.rgr.ooo/css/common,login,zhtml,skin.css?skin=harmony&v=190917014818
Requested by
Host: vpn.rgr.ooo
URL: https://vpn.rgr.ooo/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
109.172.51.252 Voronezh, Russian Federation, ASN41691 (SUMTEL-AS-RIPE Moscow, Russia, RU),
Reverse DNS
Software
nginx /
Resource Hash
f70f45f782b930d29392bf471a42c2bb0105e3034fdc6c79bc78302bc1f53c76
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://vpn.rgr.ooo/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 06 Sep 2020 21:09:34 GMT
Content-Encoding
gzip
Server
nginx
X-Frame-Options
SAMEORIGIN
Vary
User-Agent, Accept-Encoding
Content-Type
text/css
Cache-Control
public, max-age=2595600
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Tue, 6 Oct 2020 22:09:33 GMT
LoginBanner_white.png
vpn.rgr.ooo/skins/_base/logos/
3 KB
4 KB
Image
General
Full URL
https://vpn.rgr.ooo/skins/_base/logos/LoginBanner_white.png?v=190917014818
Requested by
Host: vpn.rgr.ooo
URL: https://vpn.rgr.ooo/css/common,login,zhtml,skin.css?skin=harmony&v=190917014818
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
109.172.51.252 Voronezh, Russian Federation, ASN41691 (SUMTEL-AS-RIPE Moscow, Russia, RU),
Reverse DNS
Software
nginx /
Resource Hash
8db258b55ceabeb5c9c8bf41f59a2743c579cfcee58c34cacc945ad9c01d6ef1
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://vpn.rgr.ooo/css/common,login,zhtml,skin.css?skin=harmony&v=190917014818
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sun, 06 Sep 2020 21:09:34 GMT
Last-Modified
Tue, 17 Sep 2019 05:28:34 GMT
Server
nginx
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
public, max-age=2595600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3299
Expires
Tue, 6 Oct 2020 22:09:34 GMT

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| ZmSkin object| link function| clientChange function| showWhatsThis function| forgotPassword function| onLoad function| BaseSkin object| skin

2 Cookies

Domain/Path Name / Value
vpn.rgr.ooo/ Name: ZM_LOGIN_CSRF
Value: 6adcbf2c-1ff1-49bc-af51-c00f3c7a0231
vpn.rgr.ooo/ Name: ZM_TEST
Value: true

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

vpn.rgr.ooo
109.172.51.252
23fa834c655ffa25ae119fbd22942e13a4f5bb19b0b91ad3de60991455f2969e
8db258b55ceabeb5c9c8bf41f59a2743c579cfcee58c34cacc945ad9c01d6ef1
f70f45f782b930d29392bf471a42c2bb0105e3034fdc6c79bc78302bc1f53c76